Linked e-resources

Details

Bridging Creativity and Group by Elements of Problem-Based Learning (PBL)
Password Recovery Using Graphical Method
An Classification on Brainwave Patterns for Parkinson Patients Using WEKA
An ontological approach for knowledge modelling and reasoning over heterogeneous crop data sources
A study on changes of supervision model in universities and fostering creative Ph. D. students in China
Evaluating Different In-Memory Cached Architectures in regards to Time-Efficiency for Big Data Analysis
Engagement in Web-based Learning System: An Investigation of Linear and Non-Linear Navigation
Can Single- Sign-On Improve Password Management? A Focus Group Study
The Relevance of Software Requirements Defects Management to Improve Requirements and Product Quality: A Systematic Literature Review
Finding the Effectiveness of Software Team Members Using Decision Tree
Data Completeness Measures
Cloud Computing: A General User's Perception and Security Awareness in Malaysian Polytechnic
The Correlations between Big Five Personality Traits and Social Networking Sites Usage of Elementary School Students in Taiwan
A Cryptographic Encryption Technique of MPEG Digital video Images based on RGB Layer Pixel Values
The Impact of Knowledge Management in Pair Programming on Program Quality
Social Networks Event Mining: A Systematic Literature Review
Personalized Learning Environment (PLE) Experience in the 21st Century: Review of Literature
Social Networks Content Analysis for Peacebuilding Application
Tree-base Structure for Feature Selection in Writer Identification
Factors That Affecting The Effective Online Collaborative Learning Environment
Comparing Features Extraction Methods for Person Authentication using EEG Signals
A Comparative Study of 2D UMI and 3D Zernike Shape Descriptor for ATS Drugs Identification
Risk assessment for Grid computing using Meta learning Ensembles
Modeling Cloud Computing Risk Assessment Using Ensemble Methods
Design Consideration for Improved Term Weighting Scheme for Pornographic Websites
A novel secure two-party Identity-Based Authenticated Key Agreement protocol without Bilinear Pairings
An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves
Selection of Soil Features for Detection of Ganoderma Using Rough Set Theory
Category-based Graphical User Authentication (CGUA) Scheme for Web Application
An Improved Certificateless Public Key Authentication Scheme For Mobile Ad hoc Networks Over Elliptic Curves
A Resource Efficient Integrity Monitoring & Response Approach for Cloud Computing Environment
A Resource Bookmarklet-triggered Literature Metadata Extraction System using Cloud Plugins.

Browse Subjects

Show more subjects...

Statistics

from
to
Export